This 12 June 2009 post from NSA’s internal SIDToday newsletter recounts a German/Afghan targeted operation and its support from the agency: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.

This 2005 article from the internal NSA newsletter SIDToday describes the conclusions of a meeting of the SIGINT Seniors group – the participants committed the 12 nations to deploy a tactical communications system in Afghanistan and build on the successful partnership during the Athens Olympics Games in advance of the 2006 Winter Olympics in Italy […]

This 12 August 2010 post from the NSA’s internal newsletter SIDToday describes the outcomes of the annual Sigint Seniors Europe (SSEURP) conference, which agreed in principle to increase information sharing: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.

This internal document for NSA employees dated 1 March 2013 provides a guide for visiting facilities related with the OAKSTAR programme,which are largely based in the United States, save for the MONKEYROCKET source, which has information forwarded to the European Technical Center in Germany: see the Intercept article The NSA Worked To “track Down” Bitcoin […]

This section of a 17 May 2006 article from an internal NSA newsletter makes it clear that Japanese foreign policy and trade activities are surveillance targets for the agency: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.

This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.

This 2013 NSA document presents an organisational chart of the German foreign intelligence service, the BND: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.

﻿
Ei.ndssraa-irichltnd 2131
Bundesnachrichtendienst
Structure of the BND
PRESIDENT
WCf PRESIDENT
(FTvtldential D*p^tyJ
virr president for
MILITARY AfFAIRS
VICE FSE5I3...

This short extract from an NSA document shows that cooperation with Germany’s intelligence services went as far as providing the country’s domestic intelligence service, the Federal Office for the Protection of the Constitution (BfV), with access to XKeyScore: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.

﻿exchange.
[TS//SI//NF) Germany: Provision of XKEYSCORE software to the ES1V will
expand their ability to support NSA as we jointly prosecute CT targets.
Technical support forXKEYSCGRE will be...

This internal NSA post from 1 February 2006 describes the visit several agency personnel to bases in Germany: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.

﻿(U//FOUO) On. the Road Again: SID Team Visits Germany
Assistant Deputy Director for Analysis & Production (S2)
Run Date: 02/01/2006
(U//FOUO) After staying around headquarters for the las...

This 21 May 2009 presentation from the NSA’s Center for Content Extraction includes a slide that shows that the communications of 122 heads of government were stored in the agency’s central “Target Knowledge Base”, 11 of whom are named. The collection for most of these targets was automated: see the Der Spiegel article ‘A’ for […]

This post from the NSA intranet dated 6 April 2001 gives the reactions of staff to the announced closure of the Bad Aibling station in Bavaria (in the event, the NSA retained a presence at the base): see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.

﻿(U//FOUO) A Little Bad Aibling Nostalgia
FROM: Some DA Veterans
Unknown
Run Date: 06/04/2004
(U//FOUO) Once the closure of Bad Aibling Station (located in southern Bavaria in
Germany) b...

This undated internal NSA document illustrates the degrees of cooperation in the agency’s relationships with different foreign powers. “Tier A” and “Tier B” are elsewhere referred to as Second and Third Parties: see the book No Place To Hide, 13 May 2014.

This excerpt from a 2006 NSA memo written by the global resources manager of the International Security Issues (ISI) mission underlines the importance of data on energy resources, production and international investment to the agency: see the book No Place To Hide, 13 May 2014.

﻿Page 138
(U) NSA Washington Mission
(U) Regional
(TS//SI) ISI is responsible for 13 individual nation states in three continents. One
significant tie that binds all these countries togethe...

This Boundless Informant slide shows the number of Italian and Spanish phone records collected day-by-day between 10 December 2012 and 8 January 2013: see the Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.

This undated selection of seven NSA slides highlights the activities the agency regards as its “core secrets”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.

This NSA document from January 2013 lists the codenames of those agency activities sufficiently sensitive to qualify as “exceptionally controlled information”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.ah

A brief description of a working group focused on monitoring and helping to exploit virtual private networks, or VPNs. Established in 2004, the working group publishes regular "VPN Target Activity Reports" on dozens of countries and organizations around the world. "These reports may help you exploit targets' VPNs more successfully," the chair of the working group writes.

Three prototypes of a new signal discovery system, SIGINT T-VO, have been installed at bases in Baghdad. The system records radio frequency signals so that analysts can find and exploit previously undiscovered VHF/UF signals and analyze events like IED detonations to detect signals that might be related to anti-Iraqi forces communications.

This undated presentation from the NSA’s Expeditionary Access Operations discusses how malware techniques are used in the field: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.

This group of three undated NSA slides provides a graphical representation of the sensitivity of aspects of the agency’s SENTRY EAGLE programme: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.

This undated NSA presentation sets out the network-mapping tool Treasure Map, and supplies information on some of the agency’s collection access points: see the Intercept article New Zealand Launched Mass Surveillance Project While Publicly Denying It, 15 September 2014.